De Anza logo Course Outlines

Public Search

 
 
Close Window/Tab
PRINT VIEW -- Opens in new, second window. Use browser controls to close when finished.
Credit- Degree applicable
Effective Quarter: Fall 2020

I. Catalog Information

CIS 102
Ethical Hacking
4.5 Unit(s)

 

Requisites: Advisory: EWRT 200 and READ 200, or ESL 261, 262 and 263; CIS 66 and CIS 108.

Hours: Lec Hrs: 48.00
Lab Hrs: 18.00
Out of Class Hrs: 96.00
Total Student Learning Hrs: 162.00

Description: Students will scan, test, hack and secure systems. Implement perimeter defenses, scan and attack virtual networks. Other topics include intrusion detection, social engineering, footprinting, DDoS attacks, buffer overflows, SQL injection, privilege escalation, trojans, backdoors, and wireless hacking. Legal restrictions and ethical guidelines emphasized. This course also helps prepare students to pass the Certified Ethical Hacker (C|EH) exam.


Student Learning Outcome Statements (SLO)

 

• Student Learning Outcome: Demonstrate the ability to attack and defend a network.


II. Course Objectives

A.Explore ethical hacking basics
B.Explore cryptography
C.Investigate reconnaissance: Information gathering for the ethical hacker
D.Explore scanning and enumeration
E.Explore hacking through the network: Sniffers and evasion
F.Investigate how to attack a computer system
G.Explore low tech hacking techniques
H.Investigate web-based hacking
I.Explore wireless network hacking
J.Investigate trojans and other attacks
K.Perform penetration testing

III. Essential Student Materials

 None

IV. Essential College Facilities

 None

V. Expanded Description: Content and Form

A.Explore ethical hacking basics
1.Introduction to Ethical Hacking
2.Legal hacking: Laws and guidelines
B.Explore cryptography
1.Cryptography and encryption overview
2.PKI, the digital certificate, and digital signatures
3.Encrypted communication and cryptography attacks
C.Investigate reconnaissance: Information gathering for the ethical hacker
1.Vulnerability research
2.Footprinting
D.Explore scanning and enumeration
1.Scanning for targets
2.Enumeration
E.Explore hacking through the network: Sniffers and evasion
1.Sniffing
2.Network roadblocks
a.Intrusion detection
b.Firewall and honeypots
F.Investigate how to attack a computer system
1.Windows system hacking
2.Linux hacking
G.Explore low tech hacking techniques
1.Social engineering
2.Physical security
H.Investigate web-based hacking
1.Attacking web servers
2.Attacking web applications
I.Explore wireless network hacking
1.Wireless Concepts
a.Network architecture and standards
b.Finding and identifying wireless networks
2.Wireless hacking
a.Wireless attacks
b.Bluetooth attacks
J.Investigate trojans and other attacks
1.Trojans, backdoors, viruses, and worm attacks
2.Denial of service attacks
3.Session hijacking
K.Perform penetration testing
1.Methodology and Steps
a.The security assessments
b.Security assessment deliverables
2.Information Gathering and Analysis

VI. Assignments

A.Reading assignments
B.Complete assigned homework review questions
C.View assigned security videos

VII. Methods of Instruction

 Lecture and visual aids
Discussion of assigned reading
Discussion and problem solving performed in class
Quiz and examination review performed in class
Homework and extended projects

VIII. Methods of Evaluating Objectives

A.Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated on correctness.
B.Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.

IX. Texts and Supporting References

A.Examples of Primary Texts and References
1.Walker, Matt. "CEH Certified Ethical Hacker Boxed Set." Edition 3. McGraw-Hill USA, 2017.
B.Examples of Supporting Texts and References
1.Sean-Philip Oriyano “Hacker Techniques, Tools, and Incident Handling." Second Edition. Jones and Bartlett Learning LLC, an Ascent Learning Company, 2017

X. Lab Topics

A.Use Metasploit to take over a Windows computer.
B.Steal passwords with a packet sniffer
C.Use whois command
D.Utilize port scan software and firewalls
E.Analyze types of port scans
F.Use software keylogger to hack computer passwords
G.Crack Windows passwords with Ophcrack
H.Perform a Denial of Service attack with Nmap
I.Utilize the Nessus vulnerability scanner